Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed   
Cryptography Standards Reports
 
CipherTrust Cloud Key Manager
sponsored by Thales
DATA SHEET: While it’s been common practice for the cloud provider to hold the key for encryption capabilities, industry best practices mandate that the keys be held by neither the cloud provider nor the end user. This data sheet takes a closer look at the key features and capabilities of the CipherTrust Cloud Key manager. Read on to get started.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by SearchSecurity.com
EGUIDE: Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

SearchSecurity.com

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Assess and Manage Cryptographic Security with Entrust Datacard™
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Entrust, Inc.

Public Key Infrastructure (PKI) Buyers Guide
sponsored by Entrust, Inc.
WHITE PAPER: When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

Entrust, Inc.

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?
sponsored by Thales
RESOURCE: As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.
Posted: 29 Apr 2020 | Published: 17 Feb 2020

Thales

Managed File Transfer Category Report
sponsored by Help/Systems
ANALYST REPORT: Selecting a managed file transfer software can be overwhelming and one of the biggest challenges facing organizations is understanding the marketplace. In this research report, explore a comprehensive list of 9 managed file transfer vendors to help you find the best fit for your organization.
Posted: 13 Feb 2020 | Published: 31 Mar 2019

Help/Systems

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info